Threat Intel Blog

The latest updates in threat intelligence: breaking news, expert analysis, and thought leadership to help security practitioners stay ahead. Subscribe to The Flashpoint Newsletter!

Trending Articles

  • Corporate and Physical Security
  • Court Documents
  • Current Events
  • Cyber Threat Intelligence
  • Data Breaches
  • DevSecOps
  • Flashpoint
  • Fraud
  • Illicit Communities
  • Infostealer
  • Insider Threats
  • Israel-Hamas Conflict
  • Product Features
  • Public Sector and Government
  • Ransomware
  • Vulnerability Management
    Cyber Threat Intelligence
    Analysis of CISA releases Advisory on Top CVEs Exploited Chinese State-Sponsored Groups
    Federal agencies released a joint advisory identifying twenty of the top vulnerabilities that have been actively ...
    Read post
    Vulnerability Management
    What We Know About the Zero-Day Vulnerability Affecting Zimbra Collaboration and cpio
    On September 10, an attack was reported in the Zimbra forums where a malicious actor was able to upload a JSP web ...
    Read post
    Cyber Threat Intelligence
    The Black Market to Avoid Putin’s Mobilization Order Is Booming
    Since Putin’s mobilization order was announced, Flashpoint has observed a growing number of chatter and ...
    Read post
    Vulnerability Management
    Marconi’s Wireless Telegraph and the First Vulnerability
    What is the first vulnerability? On first thought, it doesn’t seem like pinpointing the first correctly defined ...
    Read post
    Ransomware
    Conti Ransomware: Inside One of the World’s Most Aggressive Ransomware Groups
    Conti ransomware has become one of the most infamous in the ransomware space. Recent developments have called ...
    Read post
    Vulnerability Management
    Why Vulnerability Management Programs Need Visibility Into Over 300,000 Vulnerabilities
    Flashpoint has been identifying and collecting vulnerabilities as they become available—with VulnDB now ...
    Read post
    Current Events
    How Russians Are Reacting to Putin’s Conscription Gamble
    Real-time data from Russian social media platforms and related illicit communities is vital to understanding the ...
    Read post
    Cyber Threat Intelligence
    What We Know About The ‘Grand Theft Auto VI’ Data Breach
    On September 18, a cyber threat actor named “teapotuberhacker” posted on GTAForums.com claiming to have ...
    Read post
    Cyber Threat Intelligence
    What Is Cryptojacking? How It Works and How to Protect Against It
    Cryptojacking is the unauthorized use of another computer to “mine” cryptocurrency—using them to run ...
    Read post
    Current Events
    Situational Awareness in Russia: Neo-Nazi Mercenary Groups, PMCs, and Illicit Financing
    Russian mercenary groups and private military companies are operating in Ukraine, including the Russian Imperial ...
    Read post
    Court Documents
    COURT DOC: Major in the U.S. Army and a Maryland Doctor Facing Federal Indictment for Allegedly Leaking Confidential Health Information
    The U.S. Department of Justice announced that a federal grand jury returned an indictment charging Anna ...
    Read post
    Court Documents
    COURT DOC: Three Iranian Nationals Charged With Engaging In Computer Intrusions And Ransomware-Style Extortion Against U.S. Critical Infrastructure Providers
    On Wednesday an indictment was unsealed charging three Iranian nationals with allegedly orchestrating a scheme to ...
    Read post
    There are no results that match your criteria.